• VOIP over W-CDMA or WIMAX

    Will VOIP solutions be better offer a W-CDMA or WIMAX and why exactly?

    Jeevang0 pointsBadges:
  • Need guidiance from pros already into the game

    Hi, I am a United Stated Marine stationed overseas since 2003, majoring in Information technology with National University. I am still an idiot in the field and thats why i joined this group. To get a glance of what to ecpect in the future. I am asking for your help in guiding me through whatever...

    Foguno0 pointsBadges:
  • Local Admin & passwords

    We have recently switched to allowing only Power User rights on notebook computers. We have a set of notebooks we loan out to employees with desktops when they need to travel. Currently those users will login with an account named loaner and use scripts and webmail to access the network. Discussion...

    Roced40 pointsBadges:
  • In Case of Emergency (ICE) – safe to use?

    Anyone having employees put ICE (In Case of Emergency) on their company cells? And should we perhaps mandate it as part of our Disaster Recovery Plan? http://www.icecontact.com.

    NoFX3915 pointsBadges:
  • Recommend good book on device management?

    Can anyone recommend a good book on managing PDAs?

    Margaret Rouse1,665 pointsBadges:
  • Blocking Tunneling Applications

    Hi; Any suggestions on how I can block hopster(and other similar socks based tunneling applications)from tunnelling out and bypassing the firewall? When hopster contacts its servers it uses different set of IPs, not a single domain, so its kind of hard to block it based on IPs Thank You

    Maryam82100 pointsBadges:
  • Detection of ActiveX & other Mobile code

    Hi ! I am trying to extend the functionality of a squid-based proxy to filter out ActiveX, JavaScripts and mobile code in general, from the web pages users will download. I am trying to make it an "intelligent" filter, in the sense of not just plainly removing the <OBJECT> tags from the page,...

    Hedgehog0 pointsBadges:
  • aaa authorization ?

    Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa authorization exec home radius E. aaa authorization network default enable F. aaa authorization...

    EngineerIT0 pointsBadges:
  • Cisco 1811/1812 vs Netscreen 5GTE

    Hello all, Did any of you have/had any experience with both Cisco 1811/1812 and Netscreen 5GT(E)? Which one is better/faster/has more features/more user friendly according to you? What I need is a router/firewall/IPS appliance that will allow me to set up some DMZ and two LANs and that will serve...

    Maciek0 pointsBadges:
  • Increasing distance coverage

    The following question was submitted to SearchNetworking.com editors. Can you help? How much distance coverage can be increased if I use a 5dbi antenna instead of a 2dpi antenna attached to our D-link dwl-2000ap+ wireless router? How about 12dbi compared to 2 dbi? SaturnS...

  • What is “backhaul”?

    The following question was submitted to SearchNetworking.com editors. Can you help? I am just now getting into designing a wireless internet application for a customer to cover an extremely large international equestrian center. I'm pretty much self-taught in this field but one thing is bothering...

  • wireless access points DHCP and drive mapping

    Hello all, I recently installed wireless access points in my organization. They are configured to set automatically via DHCP on a 2000 server machine. It seems to work fine. But when I map a drive on client laptops running XP Pro and set it to reconnect at logon the drive either mysteriously...

    Zzegri0 pointsBadges:
  • How to use Exchange 2003 with my mobile Pocket PC from Internet

    Hi. I tested use OMA (Outlook Mobile Access) from Internet, this is usefull for mobile devices like cellular phones. But I want configure clients with pocket PCs to access their mailbox from Internet with active sync. Who knows what I need to do to configure the exchange server, what I need to do...

    Schnell0 pointsBadges:
  • IM Blocking and URL Filtering

    We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL filterings can be imposed as per company's policy. Those users who are not on the domain, they can not...

    EngineerIT0 pointsBadges:
  • Mixed wired and wireless network

    I have an ADSL modem going to a wired router which in turn is connected to 5 PCs. The router is also connected to a wireless router which in turn is connected wirelessly to 2 PCs and a wired connection to another PC. The 5 PCs connected directly to the wired router can see each other over the...

    Kisser0 pointsBadges:
  • Consolidated Security Product/Approach? What about layered approach?

    Hi Punnet, I'm a It Director at lasrge Media firm in NY. Looking at the security overhaul in the recent months and business looking to cxonsolidate the offices enviornment the talk of the town is to have ALL IN One device which does Firewall,IDS,VPN etc. I thought layerd security approach was the...

    Networksecure10 pointsBadges:
  • Demilitarized zone using iptables?

    Hi, I'm the Assistant Editor for SearchEnterpriseLinux.com. One of our users, "ruhi," posted the following question. Can you help? "I have to plan and design a demilitarized zone using iptables. How can I do this?" You can post your answer here on ITKE, or reply to...

    AmyKucharik870 pointsBadges:
  • Sendig Mail to user@IP

    We have two Mx Record (same ISP) pointing to the same mail server. The Mail Server is REDHAT Linux. I want to send a mail to user@ip address (first or second Mx Record). This is basically to test if first Mx record fails, will the second record be used. I would be sending this mail from the LAN to...

    Jagdish60 pointsBadges:
  • Punching through the mud

    I am trying to set up wireless access in two apartments from a nearby office on a small campus. I hooked up an access point in the office, but was unable to get a signal about 50 feet away in one of the apartments. There are 3 intervening walls, two of which are 1 foot thick adobe. My question is,...

    Douger0 pointsBadges:
  • Wireless B, G, and G+

    Hi I was wondering if anyone can tell me what's the difference between wireless B, G, and G+, and what are the pros/cons of each? thanks, E.

    EileenC0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following